Type: FindingSubcategory
Enumeration of the different detailed subcategorizations of Findings.
ENUMERATION VALUES
- ANY_CRYPTO: Any Crypto Material detection
- AUTH_KEY_FILE_PRESENT: Auth Key File detected
- BLANK_ROOT_PASSWORDS: Root user account with empty / blank password
- BLANK_USER_PASSWORDS: User account with empty / blank password
- DEAD_CODE
- DEBUG_FLAG_ON: Software compiled with DEBUG flag enabled
- DOUBLE_FREE: Double Free detection. Double Free is a type of memory corruption flaw that can be exploited by an attacker to execute arbitrary code or cause a denial of service (DoS) condition.
- EXPIRED_CERTIFICATE: Expired Certificate detected
- EXPRESSION_ALWAYS_TRUE
- HARD_CODED_CODE_KEY
- HEAP_BUFFER_OVERFLOW: Heap Buffer Overflow detection. Heap Buffer Overflow is a type of memory corruption flaw that can be exploited by an attacker to execute arbitrary code or cause a denial of service (DoS) condition.
- HIGH_CODE_COMPLEXITY
- HTTP_REQUEST_BODY: HTTP server configured without request body size limit
- HTTP_REQUEST_FIELDS_UNLIMITED: HTTP server configured without request fields limit
- HTTP_REQUEST_HEADER_SIZE: HTTP server configured without header size limit
- HTTP_REQUEST_LINE_SIZE: HTTP server configured without request line size limit
- IMPROPER_LENGTH_HANDLING
- IMPROPER_NEUTRALIZATION
- INCORRECT_BEHAVIOR_ORDER
- INCORRECT_RANDOM_SEED
- INCORRECT_RANDOM_USAGE
- INFORMATION_DISCLOSURE_LEAK
- INHERENTLY_DANGEROUS_FUNCTION: Use of inherently dangerous function
- INSECURE_CURL
- INSECURE_TEMP_FILE: Use of insecure temp file
- LINUX_NO_CANARY
- LINUX_NO_NX
- LINUX_NO_RELOC
- LINUX_NO_RELRO
- LOGIC_BOMB_DATE_TIME
- LOGIC_BOMB_ENCRYPTION
- LOGIC_BOMB_GENERAL
- LOGIC_BOMB_NETWORKING
- LOGIC_BOMB_TASK_MGMT
- LOGIC_BOMB_USER_MGMT
- MISSING_VARIABLE_INIT: Missing initialization of a variable. This can lead to undefined behavior and potentially exploitable conditions.
- NUMERIC_TRUNCATION
- OBSOLETE_FUNCTION: Use of deprecated function
- PASSWD_HARD_CODED_PASSWORDS: Hard coded passwords detected in passwd files
- PASSWD_USER_ACCOUNTS: User account detected in passwd file
- PEM_CERTIFICATE_EXPIRED: Expired PEM Certificate detected
- PEM_CERTIFICATE_KEY: PEM Certificate detected
- PGP_PRIVATE_KEY: PGP Private Key detected
- PKCS8_PRIVATE_KEY: PKCS8 Private Key detected
- PKCS12_PRIVATE_KEY: PKCS12 Private Key detected
- POTENTIALLY_DANGEROUS_FUNCTION: Use of potentially dangerous function
- REMOTE_CODE_EXECUTION_BACKDOOR
- REUSING_NONCE
- SELF_SIGNED_CERT: Self Signed Certificate detected
- SELINUX_DISABLED: SE Linux disabled
- SHADOW_HARD_CODED_PASSWORDS: Hard coded passwords detected in shadow files
- SSH_DEFAULT_PORT: SSH daemon configured to use default port
- SSH_MAX_RETRIES: SSH daemon configured max retries
- SSH_PERMIT_EMPTY_PASSWORD: SSH daemon configured to permit empty passwords
- SSH_PERMIT_ROOT: SSH daemon configured to permit root login
- SSH_PRIVATE_KEY: SSH Private key detected
- SSH_WEAK_CIPHERS: SSH daemon configured to use weak ciphers
- SSL_PRIVATE_KEY: SSL Private Key detected
- STACK_BUFFER_OVERFLOW: Stack Buffer Overflow detection. Stack Buffer Overflow is a type of memory corruption flaw that can be exploited by an attacker to execute arbitrary code or cause a denial of service (DoS) condition.
- TELNETD_STARTED
- UNCHECKED_RETURN_VALUE
- USE_AFTER_FREE: Use After Free detection. Use After Free is a type of memory corruption flaw that can be exploited by an attacker to execute arbitrary code or cause a denial of service (DoS) condition.
- VERY_HIGH_CODE_COMPLEXITY
- VXWORKS_EXE_NO_INT_PROT
- VXWORKS_EXE_NO_KERNEL_PROT
- VXWORKS_EXE_NO_PASSWORD
- VXWORKS_EXE_NO_USER_STACK_PROT
- VXWORKS_EXE_NO_WRITE_PROT
- VXWORKS_HARD_CODED_PASSWORDS: Hard coded passwords detected in VxWorks
- WEAK_RANDOM_SEED
- WGET_NO_CERTIFICATE_CHECK
- WIFI_HARD_CODED_PASSWORDS: Hard coded Wifi passwords detected
- WINDOWS_NOT_STRIPPED
- WINDOWS_NO_NX
- WINDOWS_PIC_RELOC
This page was generated: 2024-11-06